One of my best This is one of the best paperson this subject I have read

COMPUTER SECURITY

AND THE

LAW

I. Introduction

You are a computer administrator for a large manufacturing company. In the middle of a production run, all the mainframes on a crucial network grind to a halt. Production is delayed costing your company millions of dollars. Upon investigating, you find that a virus was released into the network through a specific account. When you confront the owner of the account, he claims he neither wrote nor released the virus, but he admits that he has distributed his password to 'friends' who need ready access to his data files. Is he liable for the loss suffered by your company? In whole or in part? And if in part, for how much? These and related questions are the subject of computer law. The answers may very depending in which state the crime was committed and the judge who presides at the trial.

English: Seal of the Defense Security Cooperation ...

Computer Security

Computer security old school

Computer security law is new field, and the legal establishment has yet to reach broad agreement on may key issues.

Advances in computer security law have been impeded by the reluctance on the part of lawyers and judges to grapple with the technical side of computer security issues[1]. This problem could be mitigated by involving technical computer security professional in the development of computer security law and public policy. This paper is meant to help bridge to gap between technical and legal computer security communities.

II. THE TECHNOLOGICAL PERSPECTIVE

A. The Objectives of Computer Security

The principal objective of computer security is to protect and assure the confidentiality, integrity, and availability of automated information systems and the data they contain. Each of these terms has a precise meaning which is grounded in basic technical ideas about...

More Computer Science essays:

... information as it passes through the computer. This is how credit card fraud is committed with the help of the Internet. What companies such as Maxis and Sierra are doing are making secure sites. These sites have the capabilities to receive credit card information securely ...

... companies is that there are some rather large security problems related with SNMP. Any decent hacker can easily access SNMP information, giving them any information ... computers, a central computer (called a mainframe ... reading terminal data, two with setting terminal data ... products ...

... Business Utilities, and Image Viewers. It is also very practical for a company ... data to a plug-in in one of the two formats: stream and file. The stream data type allows the plug-in to operate on data ... 's award winning product. ASAP is ... access online information. Today' ... they would read printed magazines. ...

... read what's on them without gaining prior permission from the company paying for the service (Flanagan 34). Perhaps in an attempt to show how secure they are, these information services will give out very little information about security itself. They all take measures to protect private information ...

... computer not to run your computerized sprinkler system for your lawn because it will have realized from the weather report that it will rain. 1) Identify and discuss security issues and considerations evident for Information ... business ...

19 pages473Dec/19963.4

Students & Profs. say about us:

"Good news: you can turn to other's writing help. WriteWork has over 100,000 sample papers"